This is part of our Virtual Buffers Lab series: Understanding, Making, and Using Buffers. This lab includes two short experiments to discover the properties of buffer solutions. Identify the ...
Slammer used the buffer overflow exploit to replicate itself. Within three minutes after the first Slammer packet was unleashed, the number of infected computers was doubling every eight seconds.